Identity Policies#
Policies, procedures, and rules, properly enacted through a participatory and well-understood governance process, will become the primary means by to shape the future direction of Information Technology in a large, loosely coupled organization.You should understand the governance procedure that is used to create policies, have a good idea of the business context of the organizational Entity, have a good inventory of the processes and identities that exist in that context, and have an interoperability framework.
We distinguish between policies and standards. Standards stipulate specific levels of performance, specify certain goods or services, set quality requirements, or describe best practices. Policies are internally developed rules of conduct and behavior that are specific to the organization. Policies often refer to standards.
The Policy Stack#
Many technologists loathe to create policies, feeling that policies stifle creativity, impede productivity, and are nothing more than an autocratic attempt to control people. In fact, if designed correctly, policies enable action and productivity. You cannot create an IMA and reap the attendant benefits without policies. They are the heart of the architecture as well as the foundation on which effective identity management strategies are formed. Policies define appropriate behavior, specify the tools and processes that will be used, communicate a consensus, and provide a foundation for enforcement.Many organizations have a smattering of security policies in place, and some of these touch on identity issues. In creating an Identity Management Architecture causes the separating out the identity aspects of those policies and creating a holistic approach to identity on which to build not only security policies, but also other important aspects of the business.
The interoperability framework of standards undergirds identity policies. These policies include naming, passwords, encryption, authentication, privacy, Access Control, provisioning, directories, and federation, among others. In turn, the Identity Management Architecture supports activities important to the business such as software practices, security policies, software licensing, contracting, procurement, customer strategies, information protection, Risk Assessment, and partner interactions.